Data Security / Privacy

Data is the new oil

Data is the currency of IoT applications and devices, for both its rightful owners and hackers working to exfiltrate valuable information assets for financial gain, infrastructure disruption or industrial espionage. While IoT data brings unparalleled potential for understanding, adapting and controlling the world around us, it also dramatically expands cyber-vulnerabilities that can result in the loss of intellectual property and privacy while exposing insight into critical infrastructure and industrial control processes.

Transport based security is not enough for IoT

Data transfer mechanisms utilizing transport based security protocols have been substantially compromised and do not guarantee end-to-end data security. IoT data requires advanced, policy-driven end-to-end security to protect data in motion and at rest, as it moves between devices and applications.

The protection of IoT data is paramount to the integrity of IoT applications. The data feeding IoT applications result in automated actions and controls that can have dangerous physical consequences.

It is critical that both the source and the content of data generated by IoT devices are protected and verifiable. However, data must be encrypted from creation to consumption, and requires a higher level of crypto versatility and intelligence than traditional one-way Transport Layer Security (TLS) encryption can provide.

Device Authority’s policy-driven encryption utilizes our patented dynamic key generation, device-derived key technology and crypto-policy agents to provide “drop-in” application-level crypto that is configurable for specific data payloads and transmissions. The drop-in agents support transparent crypto processing of data sent over HTTP, MQTT, and custom protocols such as ThingWorx AlwaysOn™, which means there is no requirement to change existing applications on devices – simply install the agent and set the policy on KeyScaler to begin securing the data.

Dynamic keys ensure that each data payload can be encrypted with one-time-use keys that are not shared over the network or stored on the device. Individual data elements can be encrypted for dynamic audiences, independently from data transport protocol security. Using KeyScaler “set and deploy” policies to determine precisely which data needs to be encrypted, our smart agent technology processes and encrypts the vast quantities of data generated at the device or network edge. This ensures regulatory compliance (e.g. EU GDPR and HIPAA) and the mitigation of risk and data loss.

Have a Question?

Interested in learning more about data security and privacy for your IoT devices? Schedule a 20-minute, online meeting with an IoT security specialist to discuss your individual requirements.